{"title":"Ensemble Features Selection Algorithm by Considering Features Ranking Priority","authors":"Puripat Thongkam, P. Leesutthipornchai","doi":"10.1007/978-3-319-60663-7_5","DOIUrl":"https://doi.org/10.1007/978-3-319-60663-7_5","url":null,"abstract":"","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"11 1","pages":"43-57"},"PeriodicalIF":0.0,"publicationDate":"2017-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75582555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Polpinij, Natthakit Srikanjanapert, Paphonput Sopon
{"title":"Word2Vec Approach for Sentiment Classification Relating to Hotel Reviews","authors":"J. Polpinij, Natthakit Srikanjanapert, Paphonput Sopon","doi":"10.1007/978-3-319-60663-7_29","DOIUrl":"https://doi.org/10.1007/978-3-319-60663-7_29","url":null,"abstract":"","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"22 1","pages":"308-316"},"PeriodicalIF":0.0,"publicationDate":"2017-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90857744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Kamrul Hasan, M. S. H. Sunny, Shifat Hossain, Mohiudding Ahmad
{"title":"User Independency of SSVEP Based Brain Computer Interface Using ANN Classifier: Statistical Approach","authors":"Md. Kamrul Hasan, M. S. H. Sunny, Shifat Hossain, Mohiudding Ahmad","doi":"10.1007/978-3-319-60663-7_6","DOIUrl":"https://doi.org/10.1007/978-3-319-60663-7_6","url":null,"abstract":"","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"8 1","pages":"58-68"},"PeriodicalIF":0.0,"publicationDate":"2017-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75727312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recent Advances in Information and Communication Technology 2017 - Proceedings of the 13th International Conference on Computing and Information Technology (IC2IT), Bangkok, Thailand, 6-7 July, 2017","authors":"","doi":"10.1007/978-3-319-60663-7","DOIUrl":"https://doi.org/10.1007/978-3-319-60663-7","url":null,"abstract":"","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76703040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-mode Semantic Cues in Soccer Video","authors":"Yu Wang, Yu Cao, Miao Wang, Gang Liu","doi":"10.14257/ASTL.2015.111.30","DOIUrl":"https://doi.org/10.14257/ASTL.2015.111.30","url":null,"abstract":"A new framework based on multimodal semantic clues and HCRF (Hidden Conditional Random Field) for soccer wonderful event detection. Through analysis of the structural semantics of the wonderful event videos, define nine kinds of multimodal semantic clues to accurately describe the included semantic information of the wonderful events. After splitting the video clips into several physical shots, extract the multimodal semantic clues from the key frame of each shot to get the feature vector of the current shots, and compose the observed sequence of the feature vectors of all shots in the test video clips. Using the above observed sequence as HCRF model input in the case of small-scale training samples, establish a wonderful event detection HCRF model effectively.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"33 1","pages":"156-160"},"PeriodicalIF":0.0,"publicationDate":"2015-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91396249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predicting Protein Subcellular Localization: A Multiobjective PSO-based Feature Subset Selection from Amino Acid Sequence of Protein","authors":"M. Mandal, A. Mukhopadhyay","doi":"10.1109/ICIT.2014.75","DOIUrl":"https://doi.org/10.1109/ICIT.2014.75","url":null,"abstract":"In this article, the probable sub cellular location of a protein is predicted by applying multiobjective particle swarm optimization (MOPSO) based feature selection technique. The feature set is created from the different amino acid compositions of the protein. Thus, the sample of protein versus amino acid compositions (features) constitutes the dataset. The proposed algorithm is designed to find subset of features so that the feature relevance is maximized and feature redundancy is minimized simultaneously. After proposed algorithm is executed on the multiclass dataset, some features are selected. Using this resultant features 10-folds cross validation is applied and corresponding accuracy, f-score, entropy, representation entropy and average correlation are calculated. The performance of the proposed method is compared with that of its single objective versions, Sequential Forward Search, Sequential Backward Search and minimum Redundancy Maximum Relevance with two schemes.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"18 1","pages":"251-255"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86817807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protection against Buffer Overflow Attacks through Runtime Memory Layout Randomization","authors":"K. S. Kumar, Raghu Neelisetti","doi":"10.1109/ICIT.2014.57","DOIUrl":"https://doi.org/10.1109/ICIT.2014.57","url":null,"abstract":"To date a number of comprehensive techniques have been proposed to defend against buffer over attacks. In spite of continuing research in this area, security vulnerabilities in software continue to be discovered and exploited. This is because the existing protection techniques suffer from one or more of the following problems: high run time overheads (often exceeding 100%), incompatibility with legacy C and C++ code, not sufficiently fine grained randomization of memory layout and the inability to perform randomization at run time rather than compile time or link time or load time. While security through diversity is a promising technique to defend against large scale cyber attacks, existing techniques are susceptible to information leakage and brute-force attacks, in addition to the short comings indicated above. To overcome the above indicated drawbacks, in this paper we propose Function Frame Run time Randomization (FFRR) technique. FFRR offers memory layout randomization at run time and performs randomization at the level of individual variables on the stack.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"54 1","pages":"184-189"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86698294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integration of Fuzzy If-Then Rule with Waveform Concatenation Technique for Text-to-Speech Synthesis in Odia","authors":"S. Panda, A. Nayak","doi":"10.1109/ICIT.2014.37","DOIUrl":"https://doi.org/10.1109/ICIT.2014.37","url":null,"abstract":"This paper describes a novel approach to Text-to-Speech synthesis in Odia language which may be used as an application in small hand held devices, benefiting people to listen to different literatures or mythological documents available in Odia. The model uses a fuzzy if-then rule text classification technique to identify the type of units involved and is being integrated with a waveform concatenative technique to produce speech out of the input text in Odia. To analyze the performance of the proposed technique, we have considered different types of words in Odia with respect to the speech quality evaluation parameters and the results of our experiments shows the effectiveness of the technique in producing intelligible speech in Odia.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"4 1","pages":"88-93"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85349967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Highly Parameterizable Simulator for Performance Analysis of NoC Architectures","authors":"Dhiman Ghosh, P. Ghosal, S. Mohanty","doi":"10.1109/ICIT.2014.66","DOIUrl":"https://doi.org/10.1109/ICIT.2014.66","url":null,"abstract":"Network, wireless, and multimedia applications executing on embedded chips demand massive data processing with lesser power consumption today. Journey of a new paradigm in the domain of parallel processing - Network-on-Chip (NoC) starts here. But unlike its simpler look both the design and test costs for this kind of real many-core chips are too high. So efficient and accurate performance estimation tools with respect to the real application ASICs are needed for system level optimization and performance analysis in a cost-effective and flexible way. Simulator that allow exploring the best design options for a system before actually building it has been becoming inevitable in system design and optimization flows. Very few simulators have been developed so far addressing such problems. Some of them are popular with its better accuracy and others with a large set of configurable architectural parameters and traffic options. In this paper, a novel GUI based highly parameterizable NoC simulator has been proposed designed using Qt and System C that is capable of handling real embedded workload traces with custom task allocation support for early exploration of application specific Network-on-Chips.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"24 1","pages":"311-315"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90714260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sonika Priyadarsini Biswal, S. Sahoo, Muktikanta Dash
{"title":"Three Stacked Conical Dielectric Resonator Antenna for Advanced Ultra Wideband Application","authors":"Sonika Priyadarsini Biswal, S. Sahoo, Muktikanta Dash","doi":"10.1109/ICIT.2014.60","DOIUrl":"https://doi.org/10.1109/ICIT.2014.60","url":null,"abstract":"In order to maneuver over the ultra wideband range, several structures have been investigated with increased impedance bandwidth. In this context a three stacked conical ring dielectric resonator antenna has been proposed to operate beyond the ultra wideband range. The proposed antenna offers a fractional bandwidth of 161% with a monopole type radiation pattern. The enhanced bandwidth is due to the resonance of the monopole antenna at about its each wavelength for which the stacked conical resonators are highly indispensable.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"54 1","pages":"134-136"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83304457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}